调用
if (rc == OK)
{
rc = ALSSSL::instance()->opensslEnc(cJsonBuf, dstBase64Buf);
}
char dstBuf[4096] = { 0 };
if (rc == OK)
{
rc = ALSSSL::instance()->opensslDec(dstBase64Buf, dstBuf);
}
定义
#include "ALSSSL.h"
#include "EL4A_if.h"
#include <fstream>
#include "ALSDM_tc.h"
#include "openssl/ssl.h"
ALSSSL::ALSSSL()
{
//todo
}
ALSSSL::~ALSSSL()
{
}
ALSSSL * ALSSSL::instance()
{
static ALSSSL obj;
return &obj;
}
int ALSSSL::initialize()
{
int rc = OK;
EL4A_FUNC_TRACE(ALSSSL, &rc);
memset(m_aes128Key, 0x00, sizeof(m_aes128Key));
memcpy(m_aes128Key, ALS_OPENSSL_AES_KEY, strlen(ALS_OPENSSL_AES_KEY));
return rc;
}
int ALSSSL::terminate()
{
int rc = OK;
EL4A_FUNC_TRACE(ALSSSL, &rc);
return rc;
}
// PKCS7填充函数
int Pkcs7Padding(char *data, int len)
{
int padding_len = AES_BLOCK_SIZE - (len % AES_BLOCK_SIZE);
EL4A_INFO(ALSSSL, "\n%s\n", data);
EL4A_INFO(ALSSSL, "len:%d, padding_len:%d \n\n", len, padding_len);
for (int i = 0; i < padding_len; i++)
{
data[len + i] = (char)padding_len;
}
return len + padding_len;
}
//去除PKCS7填充
int Pkcs7Unpadding(unsigned char *data, int length)
{
/* 取出最后一个字节数据 */
int padding_size = data[length - 1];
EL4A_INFO(ALSSSL, "padding_size:%d ,%d ,%d\n\n", padding_size, data[length - 1], length);
if (padding_size > AES_BLOCK_SIZE || padding_size == 0)
{
EL4A_INFO(ALSSSL, "padding err\n\n");
return -1; // 非法填充
}
int padding_index = length - padding_size;
for (int i = 0; i < padding_size; i++)
{
if (data[padding_index + i] != (unsigned char)padding_size)
{
EL4A_INFO(ALSSSL, "padding err :%d ,%d\n\n", data[padding_index + i], padding_size);
return -1; // 非法填充
}
}
EL4A_INFO(ALSSSL, "padding_index:%d \n", padding_index);
data[padding_index] = '\0';
EL4A_INFO(ALSSSL, "test:\n%s\n", (char *)data);
return padding_index;
}
int base64_encode(unsigned char *in_byte_str, int in_len, char *out_base_str) {
BIO *b64, *bio;
BUF_MEM *bptr = NULL;
size_t size = 0;
if (in_byte_str == NULL || out_base_str == NULL)
return -1;
b64 = BIO_new(BIO_f_base64());
bio = BIO_new(BIO_s_mem());
bio = BIO_push(b64, bio);
BIO_write(bio, in_byte_str, in_len);
BIO_flush(bio);
BIO_get_mem_ptr(bio, &bptr);
memcpy(out_base_str, bptr->data, bptr->length);
out_base_str[bptr->length - 1] = '\0';
size = bptr->length;
BIO_free_all(bio);
return size;
}
int base64_decode(char *in_base64_str, int in_len, unsigned char *out_base_str)
{
BIO *b64, *bmem;
//todo
//base64中默认每间隔64个字符增加一个回车符号,计算回车符号个数
int iCRLFNumber = (in_len % 64) == 0 ? in_len / 64 - 1 : in_len / 64;
int iEqualNumber = 0;
//base64等号个数,最多两个
if (in_base64_str[in_len - 1] == '=')
{
iEqualNumber = 1;
if (in_base64_str[in_len - 2] == '=')
{
iEqualNumber = 2;
}
}
//base64去除后增加的回车符后,解析后长度比解码后增加1/3。
//解码后的长度是其的3/4
int ioutByteLen = (in_len - iCRLFNumber) * 3 / 4 - iEqualNumber;
if (in_base64_str == NULL || out_base_str == NULL)
return -1;
b64 = BIO_new(BIO_f_base64());
bmem = BIO_new_mem_buf((void*)in_base64_str, in_len);
bmem = BIO_push(b64, bmem);
BIO_read(bmem, out_base_str, in_len);
BIO_free_all(bmem);
std::string aesHexStr;
for (size_t i = 0; i < ioutByteLen; ++i)
{
char hex[3];
sprintf(hex, "%02X", out_base_str[i]);
aesHexStr += hex;
}
EL4A_DEBUG(ALSSSL, "hexAes[%s], len:%d\n", aesHexStr.data(), aesHexStr.length());
return 0;
}
/*
* AES-128-ECB PKCS7 加密 函数
* input:经过PKCS7填充后的明文数据
* outhex:加密后的命名数据16进制数,可以使用base64_encode转换为base64格式字符串密文
* key:密钥
* len:经过PKCS7填充后的明文数据长度
*/
void AesEcb128Pkcs7Encrypt(char *input, char *cBase64out, unsigned char *key, int len)
{
int rc = OK;
EL4A_FUNC_TRACE(ALSSSL, &rc);
EL4A_INFO(ALSSSL, "key:%s, inputlen: %d\n", (char*)key, len);
AES_KEY aesKey;
AES_set_encrypt_key(key, 128, &aesKey);
unsigned char enchex[4096] = { 0 };
for (size_t i = 0; i < len; i += AES_BLOCK_SIZE)
{
AES_encrypt((unsigned char*)input + i, enchex + i, &aesKey);
//EL4A_DEBUG(ALSSSL, "i:%d\n\n", i);
}
/* 将加密后的数据转换成十六进制字符串 */
std::string aesHexStr;
for (size_t i = 0; i < len; ++i)
{
char hex[3];
sprintf(hex, "%02X", enchex[i]);
aesHexStr += hex;
}
/* 将hex转为base64 */
int iRetbase64Len = base64_encode(enchex, len, cBase64out);
EL4A_DEBUG(ALSSSL, "buf[%s], len:%d, hexAes[%s], len:%d\n", cBase64out, strlen(cBase64out),
aesHexStr.data(), aesHexStr.length());
EL4A_DEBUG(ALSSSL, "iRetbase64Len:%d\n", iRetbase64Len);
}
/*
* AES-128-ECB PKCS7 解密 函数
*/
void AesEcb128Pkcs7Decrypt(unsigned char* input, unsigned char* output, unsigned char* key, int len)
{
int rc = OK;
EL4A_FUNC_TRACE(ALSSSL, &rc, "input:%s", input);
EL4A_INFO(ALSSSL, "key:%s, inputlen: %d\n", (char*)key, len);
AES_KEY aesKey;
AES_set_decrypt_key(key, 128, &aesKey);
unsigned char enchex[4096] = { 0 };
//todo
//base64中默认每间隔64个字符增加一个回车符号,计算回车符号个数
int iCRLFNumber = (len % 64) == 0 ? len / 64 - 1 : len / 64;
int iEqualNumber = 0;
//base64等号个数,最多两个
if (input[len - 1] == '=')
{
iEqualNumber = 1;
if (input[len - 2] == '=')
{
iEqualNumber = 2;
}
}
//base64去除后增加的回车符后,解析后长度比解码后增加1/3。
//解码后的长度是其的3/4
int ioutByteLen = (len - iCRLFNumber) * 3 / 4 - iEqualNumber;
unsigned char *out_base_str = new unsigned char[ioutByteLen];
memset(out_base_str, 0, ioutByteLen);
/* 将base64换成十六进制字符串 */
base64_decode((char*)input, len, out_base_str);
/* 将base64解密 */
for (size_t i = 0; i < ioutByteLen; i += AES_BLOCK_SIZE)
{
AES_decrypt(out_base_str + i, output + i, &aesKey);
EL4A_DEBUG(ALSSSL, "i:%d\n\n", i);
}
if (out_base_str != nullptr)
{
delete[] out_base_str;
out_base_str = nullptr;
}
}
int ALSSSL::openSSLTest(int iSize, char* cSrcBuf, char *cDestBuf)
{
int rc = OK;
EL4A_FUNC_TRACE(ALSSSL, &rc);
OpenSSL_add_ssl_algorithms(); // 初始化
SSL_load_error_strings(); // 为打印调试信息作准备
SSL_CTX* ctx = NULL;
const SSL_METHOD* meth = NULL;
meth = TLSv1_client_method(); // 采用什么协议(SSLv2/SSLv3/TLSv1)在此指定
ctx = SSL_CTX_new(meth);
EL4A_INFO(ALSSSL, "%X", ctx);
unsigned char Key[AES_BLOCK_SIZE] = { 0 };
memset(Key, 0x00, sizeof(Key));
memcpy(Key, ALS_OPENSSL_AES_KEY, strlen(ALS_OPENSSL_AES_KEY));
/* PKCS7填充明文 */
int allLen = Pkcs7Padding(cSrcBuf, strlen(cSrcBuf));
/* 加密 */
AesEcb128Pkcs7Encrypt(cSrcBuf, cDestBuf, Key, allLen);
unsigned char output[4096] = { 0 };
/* 解密 */
AesEcb128Pkcs7Decrypt((unsigned char *)cDestBuf, output, Key, allLen);
/* PKCS7解填充 */
int plaintext_len = Pkcs7Unpadding(output, allLen);
return 0;
}
int ALSSSL::opensslEnc(char* cSrcBuf, char *cDestBase64Buf)
{
int rc = OK;
EL4A_FUNC_TRACE(ALSSSL, &rc);
/* PKCS7填充明文 */
int allLen = Pkcs7Padding(cSrcBuf, strlen(cSrcBuf));
/* 加密 */
AesEcb128Pkcs7Encrypt(cSrcBuf, cDestBase64Buf, m_aes128Key, allLen);
return 0;
}
int ALSSSL::opensslDec(char* cSrcBase64Buf, char *cDestBuf)
{
int rc = OK;
EL4A_FUNC_TRACE(ALSSSL, &rc);
/* 解密 */
AesEcb128Pkcs7Decrypt((unsigned char *)cSrcBase64Buf, (unsigned char *)cDestBuf, m_aes128Key, strlen(cSrcBase64Buf));
/* PKCS7解填充 */
int plaintext_len = Pkcs7Unpadding((unsigned char*)cDestBuf, strlen(cDestBuf));
return 0;
}
运行结果:
[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:290] ALSSSL::opensslEnc >(void)
[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:45] Pkcs7Padding
{
"listCameraSN":[
{
"id":1,
"sn":"23244628"
},
{
"id":2,
"sn":"2231"
},
{
"id":3,
"sn":"323908"
}
],
"stMonitorConfig":{
"bStartMonitor":true,
"iDelayTime":100
},
"listSerialPort":[
{
"iCom":3,
"iBaud":115200,
"iParity":0,
"iDataBit":8,
"iStopBit":0,
"iTimeout":30000,
"iIntervalTime":50
}
],
"stComConfig":{
"iCameraControlBoard":3,
"iCameraControlBoard1":4,
"iCameraControlBoard2":5,
"iCameraControlBoard3":6
}
}
[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:46] Pkcs7Padding len:697, padding_len:7
[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:165] AesEcb128Pkcs7Encrypt >(void)
[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:167] AesEcb128Pkcs7Encrypt key:purechip, inputlen: 704
[2024-01-27 18:35:23.552][D][29544]<ALSSSL>[alsssl:192] AesEcb128Pkcs7Encrypt buf[itYQ9MhUgOvk5mkTCEnY3TU3Ce9H8JESO9QNu98onHiEX5K/jyBXHAbXxX4dZxVW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], len:954, hexAes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len:1408
[2024-01-27 18:35:23.552][D][29544]<ALSSSL>[alsssl:194] AesEcb128Pkcs7Encrypt iRetbase64Len:955
[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:165] AesEcb128Pkcs7Encrypt <()=0x0
[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:290] ALSSSL::opensslEnc <()=0x0
[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:304] ALSSSL::opensslDec >(void)
[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:204] AesEcb128Pkcs7Decrypt >(input:itYQ9MhUgOvk5mkTCEnY3TU3Ce9H8JESO9QNu98onHiEX5K/jyBXHAbXxX4dZxVW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)
[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:206] AesEcb128Pkcs7Decrypt key:purechip, inputlen: 954
[2024-01-27 18:35:23.552][D][29544]<ALSSSL>[alsssl:150] base64_decode hexAes[8AD610F4C85480EBE4E669130849D8DD353709EF47F091123BD40DBBDF289C78845F92BF8F20571C06D7C57E1D6715569C85676D0F6932C7A0944429397CFFAF11AFAA908351094EE293365A03939096EFE6368515C124B89DD8693148C31B2F9E68C6E59A2E2D073A5B4F9ECD837DC5BD238CE336753AB4E836577F9C8C6C75CF18C330E301EADE55971E118F4B69587AC18C75DA6FE087C197A63ECA9ABDAB80B655B5AE068437B7F9CFCA6D3F193B429FF222EF9E822E001155907DAC060127C4CD1331E4F80BD74576E5E55F32FF61537ECA7AE90560E3028DC04E3097F7DFDF2E9430A03B4B4757916114E6542009CA9A26E0A537D980E623740835DF18D3C7DB5B88DDD66A1E1C439C7A96BCCC2FC4E3A2701AD2F08C2344A368454C9E79CC845DDD488B7F158A27EBDBA6FFE2898B7CA2F480D9E4D1F04E9A5E8EBFA9E2BC2F6B8215D8A281158A2B4C7A286B1A2BBD64458C590792EA56919205D2A64956FDD5D81869C2FBCD1D79A79B2375BD0BD993729F25F905D288E5CF0BC7AACB29EEE1EDBD949190B9F245412F9F4D317A1D8823716761F7B5F46AD53A229ABEA6DEEF89C03EDD7957F31F9B8A6C53AFC766820BB4B2BD13178E7CC8AA0282BD073D207CFBF6AAAC6471A38F0FA1977662B644A134F7A8D7403A9B6B348FB72EBA7AE9CFA00B42733B01F16449A43A8170A2159B1A81073DCE3A8899FF5A72817355C5448BF5941B88ED9F5D9949F4BA8F7C2D3A43377CCBBF5835B05BA645B0FEE81FC035D94E65C1ADF2439AED14C56D8259F06A7451BA4BB2AA216A15825363377F1E3E1976A054B44842F6559D2EBA00B1D85F5936D0CFC4B3AA684405B0EF702568DD9F3F0E562CAB559635A7E938688500B8444FCE0A5336EDA032ECBB05AA6A8BF8848F2FBF1E5DF67EEF036D2DDBC6C448F1121BCBB00E7019D49A0348CEFE5EE672177773B77A7F7BCA405D81814C01B306DB38D8014AF062C8BF], len:1408
[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:204] AesEcb128Pkcs7Decrypt <()=0x0
[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:61] Pkcs7Unpadding padding_size:7 ,7 ,704
[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:78] Pkcs7Unpadding padding_index:697
[2024-01-27 18:35:23.552][I][29544]<ALSSSL>[alsssl:80] Pkcs7Unpadding test:
{
"listCameraSN":[
{
"id":1,
"sn":"23244628"
},
{
"id":2,
"sn":"2231"
},
{
"id":3,
"sn":"323908"
}
],
"stMonitorConfig":{
"bStartMonitor":true,
"iDelayTime":100
},
"listSerialPort":[
{
"iCom":3,
"iBaud":115200,
"iParity":0,
"iDataBit":8,
"iStopBit":0,
"iTimeout":30000,
"iIntervalTime":50
}
],
"stComConfig":{
"iCameraControlBoard":3,
"iCameraControlBoard1":4,
"iCameraControlBoard2":5,
"iCameraControlBoard3":6
}
}
[2024-01-27 18:35:23.552][T][29544]<ALSSSL>[alsssl:304] ALSSSL::opensslDec <()=0x0